DOI QR코드

DOI QR Code

A novel, reversible, Chinese text information hiding scheme based on lookalike traditional and simplified Chinese characters

  • Feng, Bin (School of software, Dalian University of Technology) ;
  • Wang, Zhi-Hui (School of software, Dalian University of Technology) ;
  • Wang, Duo (School of software, Dalian University of Technology) ;
  • Chang, Ching-Yun (Computer Laboratory, University of Cambridge) ;
  • Li, Ming-Chu (School of software, Dalian University of Technology)
  • Received : 2012.05.15
  • Accepted : 2012.12.23
  • Published : 2014.01.30

Abstract

Compared to hiding information into digital image, hiding information into digital text file requires less storage space and smaller bandwidth for data transmission, and it has obvious universality and extensiveness. However, text files have low redundancy, so it is more difficult to hide information in text files. To overcome this difficulty, Wang et al. proposed a reversible information hiding scheme using left-right and up-down representations of Chinese characters, but, when the scheme is implemented, it does not provide good visual steganographic effectiveness, and the embedding and extracting processes are too complicated to be done with reasonable effort and cost. We observed that a lot of traditional and simplified Chinese characters look somewhat the same (also called lookalike), so we utilize this feature to propose a novel information hiding scheme for hiding secret data in lookalike Chinese characters. Comparing to Wang et al.'s scheme, the proposed scheme simplifies the embedding and extracting procedures significantly and improves the effectiveness of visual steganographic images. The experimental results demonstrated the advantages of our proposed scheme.

Keywords

References

  1. M. J. Atallah, V. Raskin, M. Crogan, C. Hempelmann, F. Kerschbaum and D. Mohamed, "Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation," in Proc. of the 4th International Workshop on Information Hiding, Pittsburgh, PA, USA, pp. 185-200, 2001.
  2. M. Chapman, "Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text," Information and Communications Security, pp. 335-345, 1997.
  3. Y. L. Chiang, L. P. Chang, W. T. Hsieh and W. C. Chen, "Natural Language Watermarking Using Semantic Substitution for Chinese Text," in Proc. of IWDW2003, Seoul, Korea, pp. 129-140, 2003.
  4. R. G. Kammer, "Data Encryption Standard (DES)", National Institute of Standards and Technology, 1999.
  5. C. C. Chang, P. Y. Pai, C. M. Yeh, and Y. K. Chan, "A High Payload Frequency-based Reversible Image Hiding Method," Information Sciences, vol. 180, no. 11, pp. 2286-2298, 2010. https://doi.org/10.1016/j.ins.2010.01.034
  6. C. C. Chang and T. D. Kieu, "A Reversible Data Hiding Scheme Using Complementary Embedding Strategy," Information Sciences, vol. 180, no. 16, pp. 3045-3058, 2010. https://doi.org/10.1016/j.ins.2010.03.027
  7. C. C. Chang, Y. P. Hsieh, and C. Y. Lin, "Lossless Data Embedding with High Embedding Capacity Based on Declustering for VQ-compressed Codes," IEEE Trans. Inf. Forensics Security, vol, 2, no. 3, pp. 341-349, 2007. https://doi.org/10.1109/TIFS.2007.902683
  8. C. C. Chang and C.Y. Lin, "Reversible Steganographic Method Using SMVQ Approach Bases on Declustering," Information Sciences, vol. 177, no. 8, pp. 1796-1805, 2007. https://doi.org/10.1016/j.ins.2006.09.014
  9. K. Maher, TEXTO,
  10. B. Murphy and C. Vogel, "The Syntax of Concealment: Reliable Methods for Plain Text Information Hiding," International Society for Optics and Photonics, 2007.
  11. R. Rivest, A. Shamir and L. Adleman, "Cryptographic Communications System and Method", U.S. Patent 4405829, 1977.
  12. X. M. Sun, H. W. Chen, L. H. Yang, and Y. Y. Tang, "Mathematical Representation of a Chinese Character and its Applications," International Journal of Pattern Recognition and Artificial Intelligence, vol. 16, no. 8, pp. 735-747, 2002. https://doi.org/10.1142/S0218001402001939
  13. X. M. Sun, G. Luo, and H. J. Huang, "Component-based Digital Watermarking of Chinese Texts," in Proc. of the 3rd International Conference on Information Security, Shanghai, China, pp. 76-81, 2004.
  14. Z. H. Wang , C. C. Chang, C. C. Lin, and M. C. Li, "A Reversible Information Hiding Scheme Using Left-Right and Up-Down Chinese Character Representation" The Journal of Systems and Software, vol. 82, no. 8, pp. 1362-1369, 2009. https://doi.org/10.1016/j.jss.2009.04.045
  15. O. Vybornova and B. Macq, "Natural Language Watermarking and Robust Hashing Based on Presuppositional Analysis," in Proc. of the IEEE International Conference on Information Reuse and Integration (IRI 2007), Las Vegas, Nevada, USA, pp. 177-182, 2007.
  16. K. Winstein, "Lexical Steganography through Adaptive Modulation of the Word Choice Hash,".
  17. S. F. Wu and L. S. Huang, "Research on Information Hiding," US-China Education Review, pp. 77-81, 2003.
  18. "Spam Mimic," 2000.
  19. P. Wayner, "Mimic Functions," Cryptologia XVI, pp. 193-214, 1992.